A method (and system) for detecting intrusions to stored data includes creating a point-time-copy of a logical unit, and comparing at least a portion of the point-time-copy with a previous copy of the logical unit. The method (and system) monitors access to a data storage system and detects an intrusion or any other intentional or unintentional, unwanted modification to data stored in the data storage system. The method (and system) also recovers data once an intrusion or other unwanted modification is detected.

 
Web www.patentalert.com

< Method for transferring data in a system having multiple transports

> Method and apparatus for adapting and hosting legacy user interface controls

> Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module

~ 00503